April 2013 Economist Magazine articles on the
中華人民共和國 People's Republic of China
Masters of the cyber-universe...
China’s state-sponsored hackers are ubiquitous—and totally unabashed
To each their own...
China’s model for controlling the internet is being adopted elsewhere
People's Republic of China's internet...
A giant cage...
U.S. security experts reject hacking allegations against China
U.S. security experts have rejected the U.S. cybersecurity firm Mandiant's allegations on cyber attacks from China, lambasting it “full of holes”. Utter BS in other words...
Chinese Characteristics of Information Warfare -
A Foreign Military Perspective - in Mandarin Chinese
Red Dragon Rising German Radio Interview:
It is best to win without fighting
總參謀部 PLA General Staff HQ Information Warfare Intent Circa 2010 & 2013....
Eight years of development of the new generation of Chinese army command and information systems roadmap...Institute of information technology of the General Staff restating their intent to continue building and promoting information technology -
2013年01月11日 14:22 来源：解放军报
2013 01 11, 2010 14:22 Source: PLA Daily
Over the past 10 years, China's national defense army building & improving information warfare capabilities.....
2012年07月29日 10:35 来源：新华网
At 10:35 on July 29, 2012 Source: Xinhua
LATEST Chinese Military
Cyber Espionage News FEBRUARY 2013
The United States had pointed @ Lanxiang as the military hackers stronghold is a mockery
Chinese hacker attacks in the United States" report are rehashed once science fiction missing any credible evidence
China's Foreign Ministry: US Firm Mandiant Making groundless speculation that the United States against hacker attacks and accusations are not professional and the People's Republic of China is not responsible for these attacks
Chinese military continues to refute the "cyber attacks" false accusations
China's Ministry of Defense: The Chinese army has never supported any hacker activity
China defense ministry refutes cyber attack allegations
China denies launching cyberattacks on US - China.org.cn
China says US hacking accusations lack proof |
Chinese hackers using Australia
China Has Found A Brutally Simple Way To Steal Corporate Secrets
Chinese Army Hackers Are Trying to Bring Down U.S. Infrastructure, After All
PLA general warns against 'accidental warfare' |
Chinese military (中國人民解放軍) blamed for global hacking attacks |
Chinese Military's 'Global Hacking HQ Found' |
China military (中國人民解放軍) linked to hacking attacks
US security group suspects 中國人民解放軍 <PLA> behind hacking attacks |
MANDIANT Intelligence Report:
APT1 Exposing One Of China's Cyber Espionage Units
APPENDIX C: THE MLAWARE ARSENAL
Fascinating video tracks a real Chinese hacker in action |
China Lashes Back at Hacking Claims -
If you are going to RSA 2013 in San Francisco here's a preview:
在2012年的變化和進步，中國的軍事演習 Changes and progress of China's military exercises in 2012 -
People's Daily Online |
Many military exercises in 2012 showed that the command method and the level of the information-based weapons and equipment of the PLA are quite impressive.
The levels of various types of information-based weapon platforms become higher and higher.
The update and upgrade of the communication means make the command and control become more and more eaccurate.
People's Republic of China's Information Warfare (IW)
“To achieve victory we must as far as possible make the enemy blind and deaf by sealing his eyes and ears, and drive his commanders to distraction by creating confusion in their minds.”
毛泽东 Mao Tse-Tung
中華人民共和國 (People’s Republic of China’s)
“goal is to achieve a strategic objective”
“You have to meet my political conditions or your government will be toppled, or you promise to meet some of my political conditions.”
… PLA Major General Hu Xaiaofeng
Businesses should 'air gap' servers and understand Chinese language
Five Trends to Watch for in Chinese Cybersecurity in 2013
(US Intelligence Report to Calculate Losses Caused by Cyberattacks from People's Republic of China)
People's Republic of Code Conflict:
Following the Hackers' Trail
非常重要 Why Your Intuition About Cyber Warfare is Probably Wrong |
Small Wars Journal
美國 - 中國電信貿易戰爭仍在繼續.....
US - China Telecommunications Trade Wars Continue.....
Chinese Report Says Cisco, Other US Companies Pose Threat to Chinese Information Security
US security survey unsuccessful Cisco shows good Huawei, ZTE cope security door - People's Daily Online
Targeted investigation Cisco ready to come out
Huawei, ZTE check the warning in the United States has been China's revaluation of the national information security
In Retribution for Huawei Investigation, Chinese State Media is Going After Cisco
2012 REPORT TO CONGRESS OF THE U.S.-CHINA ECONOMIC AND SECURITY REVIEW COMMISSION
The 18th Chinese Comunist Party Congress &
China to speed up full military IT application: Hu - Xinhua | http://news.xinhuanet.com/english/special/18cpcnc/2012-11/08/c_131959900.htm
Chinese Military …. Future Cyber OPS
8 NOV 2012: President Hu JinTao:
“China will speed up full military IT Applications by 2020”
“…train a new type of high-caliber military personnel in large numbers, intensively carry out military training under computerized conditions, and enhance integrated combat capability based on extensive IT application…”;
“…implement the military strategy of active defense for the new period, and enhance military strategic guidance as the times so require”;
“…strengthen national defense aim to safeguard China's sovereignty, security and territorial integrity and ensure its peaceful development…“; and,
“…enhance the capability to accomplish a wide range of military tasks, the most important of which is to win local war in an information age…“;
US Military Cyber Operations
2011 - USCJCS : Joint Terminology for Cyberspace Operations
The United States Army's Cyberspace Operations Concept Capability Plan 2016-2028
TRADOC Pamphlet 525-7-8 22 February 2010
USAF Cyber Space Operations AF Doctrine Document 3-12 Incorporating Change 1, 30 NOV 2011
Communist Party of China (CPC) opens national congress
at decisive stage of modernizing China
Tech Wars with People's Republic of China Start |
Cisco Routed From Chinese Telecom Network
Daily World Cyber Situational Awareness Here:
Red-DragonRising.com specializes in assisting intelligence & counter-intelligence organizations understand the Far East - specifically the People's Republic of China. Red-DragonRising is designed to create awareness, educate and facilitate a better understanding of China's Cyber Warfare initiatives.
Much like the Chinese Cyber Threat, Red Dragon Rising is continuously changing and evolving.